Fan-Hsun Tseng

Fan-Hsun Tseng
National Cheng Kung University | NCKU · Department of Computer Science and Information Engineering

PhD

About

73
Publications
17,668
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,150
Citations
Introduction
Fan-Hsun Tseng received the Ph.D. degree in Computer Science and Information Engineering from the National Central University, Taoyuan, Taiwan, in 2016. From 2018 to 2021, he joined the faculty of the Department of TAHRD, National Taiwan Normal University, Taipei, Taiwan. In 2021, he joined the faculty of the Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, where he is currently an Associate Professor since 2024.
Additional affiliations
August 2021 - January 2024
National Cheng Kung University
Position
  • Assistant Professor
February 2018 - July 2021
National Taiwan Normal University
Position
  • Professor (Assistant)
October 2017 - January 2018
National Dong Hwa University
Position
  • PostDoc Position
Education
September 2010 - August 2016
National Central University
Field of study
  • Department of Computer Science and Information Engineering
September 2008 - August 2010
National Ilan University
Field of study
  • Department of Computer Science and Information Engineering
September 2005 - August 2008
National Ilan University
Field of study
  • Department of Electronic Engineering

Publications

Publications (73)
Article
Data center benefits cloud applications in providing high scalability and ensuring service availability. However, virtual machine (VM) placement in data center poses new challenges for service provisioning. For many cloud services such as storage and video streaming, present placement approaches are unable to support network-demanding services due...
Article
In order to optimize the resource utilization of physical machines (PMs), the workload prediction of virtual machines (VMs) is vital but challenging. Most of existing literatures focus on either resource prediction or allocation individually, but both of them are highly correlated. In this paper, we propose a multiobjective genetic algorithm (GA) t...
Article
Full-text available
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious...
Article
Full-text available
By collecting and analyzing a vast quantity and different categories of information, traffic flow and road congestion can be predicted and avoided in intelligent transportation system. However, how to tackle with these big data is vital but challenging. Most existing literatures utilized batch method to process a bunch of road data that cannot achi...
Article
Unmanned aerial vehicle (UAV)-assisted mobile communication has been studied in recent years. UAVs can be used as aerial base stations (BSs) to improve the performance of terrestrial mobile network. In this article, mobile data offloading with UAV trajectory optimization is investigated. To tackle with the delay of requesting data and the immediacy...
Article
Aluminum extrusion is pivotal in industrial manufacturing for ubiquitous daily products, and the extrusion process determines the profile quality. This study is the first to build a cyberphysical system (CPS) for aluminum extrusion that autonomously predicts profile temperatures by collecting sensor data, aiming to optimize the industrial process a...
Article
Currently, deep learning technology has become a crucial branch of artificial intelligence, particularly in consumer electronics, where it brings numerous innovative applications through classification and object detection techniques. However, research shows that deep neural networks are susceptible to adversarial example. This brings a series of s...
Chapter
Instant messaging (IM) has been widely used for many years since Internet technology developed and all-IP network architecture proposed. 5G mobile network launched worldwide a few years ago for pursuing ultra-low latency and high speed data transmission. In this paper, an IM application is developed in an open source 5G core (5GC) network framework...
Article
Full-text available
To extend a network’s lifetime, wireless rechargeable sensor networks are promising solutions. Chargers can be deployed to replenish energy for the sensors. However, deployment cost will increase when the number of chargers increases. Many metrics may affect the final policy for charger deployment, such as distance, the power requirement of the sen...
Article
Due to the development of technologies, such as the Internet and mobile communication, news production is increasing day by day. Proper news delivery can lead to a thriving economy and disseminate knowledge. However, in addition to disrupting the existing order, fake news may create incorrect values and even beliefs. Therefore, detecting the authen...
Article
Screws play a critical role as essential components across various industries. To meet market demands and standards, screw manufacturers are embracing digital transformation and leveraging artificial intelligence (AI) techniques. AI models have also been proposed for identifying defective products. However, most studies are limited to controlled en...
Article
Full-text available
Intelligent reflecting surface (IRS) composed of a large number of low‐cost, phase‐adjustable passive reflecting elements, which is an attractive solution of overcoming the signal attenuation and interference. IRS can be used as a low‐power passive system with signal enhancement and interference suppression. However, the planning problem of a large...
Article
Full-text available
In cryptography, oblivious transfer (OT) is an important multi-party cryptographic primitive and protocol, that is suitable for many upper-layer applications, such as secure computation, remote coin-flipping, electrical contract signing and exchanging secrets simultaneously. However, some no-go theorems have been established, indicating that one-ou...
Article
In recent years, artificial intelligence (AI) has been developed vigorously, and a great number of AI autonomous applications have been proposed. However, how to decrease computations and shorten training time with high accuracy under the limited hardware resource is a vital issue. In this paper, on the basis of MobileNet architecture, the dense sq...
Preprint
Full-text available
The rapid development of the Internet of Things and multimedia applications has led to an exponential growth in mobile network traffic year by year. In order to meet the demand for large amounts of data transmission and solve the problem of insufficient spectrum resources, millimeter waves are adopted for 5G communication. For B5G/6G, effective use...
Article
Full-text available
The sustainable utilization of marine resources is a vital issue to enrich marine life and to prevent species extinction caused by overfishing. Nowadays, it is common that commercial and smaller vessels are equipped with an Automatic Identification System (AIS) and GPS for better vessel tracking to avoid vessel collision as well as mayday calls. Ad...
Article
In order to maintain the data privacy and security for consumers, the data encryption is closely related to our daily lives. The symmetric encryption is currently the most widely used encryption method in consumer electronics fields, especially in services involving Internet of Thing devices due to easy usage, quickly and lower computing costs. How...
Article
A wireless rechargeable sensor network was proposed to extend the lifetime of the wireless sensor network. In this article, a charger is combined together with a self-propelled vehicle to provide a more flexible result of charger deployment. The dynamic chargers path selection problem is defined and mapped into the traveling salesman problem. Four...
Chapter
In order to provide a more flexible wireless rechargeable sensor network, a charger and a self-propelled vehicle are integrated into one vehicle in recent years. The path selection problem of mobile chargers can be formulated as the well-known travelling salesman problem. Therefore, metaheuristic algorithms can be applied to solve the planning prob...
Chapter
The global COVID-19 pandemic leads people to intermittent quarantines and lockdowns. Many large and crowded gatherings were postponed or even cancelled to prevent social distance violation. The paper aims to tackle the placement problem of macro sites, microcells and picocells under a restricted network topology. The cell placement problem is defin...
Chapter
There were many undeveloped countries upgraded to emerging countries in recent years; as a result, the farmland has been transferred to commercial or industrial lands that significantly reduce the areas of farmland, lowers down the agricultural labor force due to the population aging and further decreases agricultural output. Additionally, many of...
Chapter
Artificial intelligence and deep learning techniques are all around our life. Image recognition and natural language processing are the two major topics. Through using TensorFlow-GPU as backend in convolutional neural network (CNN) and deep learning network, image recognition has been an extreme breakthrough in recent years. However, more and more...
Article
Full-text available
The aims of this study are to examine the effect of crowdsourced employer ratings and employee recommendations of an employer as an employer of choice, to examine which employer ratings that represent different employee value propositions can predict the overall employer rating through crowdsourcing, to examine whether the Fortune 500 ranking can a...
Conference Paper
In recent years, the transmission rate of mobile network becomes insufficient to serve numerous mobile users. Relay technique has been proposed to improve the data rate of mobile networks for many years. In the paper, the planning problem of heterogeneous cellular network is defined and limited in two-hop relaying. The defined problem aims to tackl...
Chapter
The research develops an intelligent aquaculture system to detect the water quality of a culture pond. Additionally, using Fuzzy Logic to evaluate water quality that influences the aquaculture livability. Each species requires a different environment of water quality; therefore, the study utilizes an intelligent aquaculture system to detect the wat...
Chapter
The numbers of people who participate in outdoor activities are increasing; however, it has a certain risk of doing outdoor activities, such as wilderness rescue and losing the force while sailing. Therefore, people performing outdoor activities usually wear relevant safety devices. Currently, most users send emergency alarms through mobile phones;...
Article
Full-text available
Abstract Content cache as well as data cache is vital to Content Centric Network (CCN). A sophisticated cache scheme is necessary but unsatisfied currently. Existing content cache scheme wastes router’s cache capacity due to redundant replica data in CCN routers. The paper presents an intelligent data cache scheme, viz content popularity and user l...
Article
Full-text available
With the growth of the human population comes the constantly rising demand for agricultural products. Nevertheless, as the world experiences climate change, many crops are often damaged by weather conditions.This study utilizes Intelligent Agriculture IoT equipment to monitor the environmental factors on a farm. The collected data underwent 3D clus...
Article
Since traffic in networks is growing rapidly, it is difficult for the existing network architecture to support the huge traffic requirement. This article proposes a novel intelligent architecture as a promising paradigm for B5G heterogeneous networks to optimize network resource usage and network performance. The main idea is to build a suitable ne...
Article
Full-text available
Sharing traffic information on the vehicular network can help in the implementation of intelligent traffic management, such as car accident warnings, road construction notices, and driver route changes to reduce traffic congestion earlier. In the future, in the case of autonomous driving, traffic information will be exchanged more frequently and mo...
Article
Full-text available
Small cell aims at improving the cell coverage and capacity of macrocell. Network operators investigate cell planning for improving system performance and for satisfying user requirements with minimal construction cost and least unserved users. Most of the existing literature merely considered a single objective function or investigated cell planni...
Article
The high-speed satellite-terrestrial network (STN) is an indispensable alternative in future mobile communication systems. In this article, we first introduce the architecture and application scenarios of STNs, and then investigate possible ways to implement mobile edge computing (MEC) technique for QoS improvement in STNs. We propose satellite MEC...
Article
Fog computing provides a more flexible service environment than cloud computing. The lightweight fog environment is suitable for industrial applications. In order to strengthen service scalability, container virtualization has been proposed and studied in recent years. It is vital to explore the trade-off between service scalability and operating e...
Article
Full-text available
The demand for satisfying service requests, effectively allocating computing resources, and providing service on-demand application continuously increases along with the rapid development of the Internet. Edge computing is used to satisfy the low latency, network connection, and local data processing requirements and to alleviate the workload in th...
Article
Full-text available
The trend of 5G mobile networks is increasing with the number of users and the transmission rate. Many operators are turning to small cell and indoor coverage of telecom network service. With the emerging Software Defined Networking and Network Function Virtualization technologies, Internet Service Provider is able to deploy their networks more fle...
Article
Full-text available
Estimating reliable class-conditional probability is the prerequisite to implement Bayesian classifiers, and how to estimate the probability density functions (PDFs) is also a fundamental problem for other probabilistic induction algorithms. The finite mixture model (FMM) is able to represent arbitrary complex PDFs by using a mixture of mutimodal d...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) have been extensively applied to various applications, such as military aircraft exploration, image transmission for dangerous terrain, relief of disaster. In general, civil UAVs utilize satellite, Global Positioning System, Wi-Fi or the third generation of mobile telecommunications (3G) for data transmission. Howeve...
Article
Full-text available
Currently, almost every family has at least one car; thus, vehicle density is increasing annually. However, road capacity is finite; consequently, traffic accident frequency may increase due to increasing vehicle density. Typically, car accidents result in traffic congestion because vehicles behind the accident are not aware of the event and contin...
Article
Software defined networking (SDN) paradigm currently does not integrate with any debugging or diagnosing mechanism. Services through Internet connection may not work properly due to network problems, such as loop and black hole problems. The study introduces sPing, a user-centred debugging mechanism for users debugging and troubleshooting network p...
Article
Nowadays Internet applications have become more complicated that mobile device needs more computing resources for shorter execution time but it is restricted to limited battery capacity. Mobile cloud computing (MCC) is emerged to tackle the finite resource problem of mobile device. MCC offloads the tasks and jobs of mobile devices to cloud and fog...
Article
Cloud computing provides the scalable computation capability based on a virtualization technique. The energy conservation for green computing is one of the vital issues while allocating resources. To improve energy efficiency, the dynamic power-saving resource allocation (DPRA) mechanism based on a particle swarm optimization algorithm is proposed....
Conference Paper
Nowadays multimedia applications surround our life. The relevant technologies of multimedia have been widely used anywhere, e.g. education, medicine, research, transportation and recreation, as long as people who has a mobile device. The computing ability of mobile device is growing rapidly, but it still has its limitations. One of significant infl...
Article
Wireless sensor network (WSN) is still a popular research field, which can be applied to various emerging research topics such as internet of things and smart grid. The sensor nodes are responsible to detect the new environment and monitor the variable situation, but suffer from battery powered with energy limitation. In this paper, we define the p...
Article
Mobile communication is facing new challenges to the soaring traffic demand of numerous user devices; thus, the notion of the small cell has been proposed and realized in recent years. However, licensed spectrum has been occupied by various underlying access technologies, so the deployment of small cells needs a sophisticated planning algorithm. In...
Article
The first service-oriented virtual machine (VM) placement for green data center is designed in this work. Integer Linear Programming (ILP) is the problem design basis. The Tree algorithm is proposed to place VM role instances at the lowest communication cost, economizing the construction cost with fewer physical servers. Another Forest algorithm is...
Article
In this paper, the planning problem of multiple evolved Node Bs (eNBs) and two types of relay nodes is defined base on linear programming. Type 1 relay nodes are placed in the center of eNB, and Type 1a relay nodes are deployed at cell edge. Three algorithms are proposed to investigate the Type 1a relay node placement and communication interference...
Article
The social media services are popular with Internet services today, such as Facebook, YouTube, Plurk and Twitter. However, the enormous interactions among human beings also result in highly computational costs. The requested resources and demands of some specific social media services are changing severely, and the virtual machines (VMs) exhaust th...
Article
Full-text available
Various mobile devices are developing rapidly in contemporary society, such as smart phones and tablet PCs. Users are able to acquire different multimedia services through wireless communication anytime and anywhere. However, the increased demand also gives rise to a problem of insufficient bandwidth. Therefore, a fourth generation mobile telecommu...
Article
In wireless sensor networks (WSNs), the coverage problem usually accompanies the energy-saving issue, which ensures the fundamental functions are workable. Therefore, the sensor nodes must be deployed and survived in the target place for a long time, and sustain the trade-off between expected coverage and limited battery energy. The lesser sensor n...
Conference Paper
The Internet Engineering Task Force (IETF) standardized and published the IPv4 protocol in September 1981. After almost 30 years, the remaining IPv4 addresses have been distributed by Internet Assigned Numbers Authority (IANA) in February 2011. Due to the exhaustion of IPv4 addresses, the transition from IPv4 to IPv6 is required definitely. The IPv...
Article
Full-text available
WSNs are significantly different from the traditional network architecture due to its wireless communication, energy limitation, and computation constraint and environment of the application. Because of these differences, security becomes a critical issue. The path-based denial of service (PDoS) attacks harm the network maintenance and cause seriou...
Article
Coverage is a vital issue that ensures that basic functions are available in wireless sensor networks (WSNs). These functions provide communications during emergency rescue or in war environments. Sensor nodes must be dispersed and survive in place for a long time in order to accurately monitor all events. However, sensor nodes rely on limited batt...
Article
There are various cloud distributed file systems have been proposed in recent years. The users are able to obtain the vast cloud storage spaces through Internet access even if the essence of storage space in portable devices and handsets are restricted and insufficient. In this work, we implement a distributed file system based on an open source na...
Conference Paper
In recent years, the resource demands in cloud environment have been increased incrementally. In order to effectively allocate the resources, the workload prediction of virtual machines (VMs) is a vital issue that makes the VM allocation more instantaneous and reduces the power consumption. In this paper, we propose a workload prediction method usi...
Article
Peer-to-peer (P2P) networks are becoming very popular since various applications such as media streaming and voice over IP use these networks in different environment settings without the need for a client-server structure. P2P protocols have been originally designed for traditional wired networks, and when deployed in wireless network environments...
Conference Paper
In recent years, many researchers focus on how to balance the number of average virtual machines (VMs) in cloud data center. However, the VMs suddenly jumped to more than the utilization threshold of the physical machine (PM) and exhausted the computing resource, which will lead to VM migration and extra cost. In this paper, the VM migration proble...
Article
In this paper, the coverage problem of network planning in mobile multi-hop relay networks is defined on the basis of integer linear programming. In order to provide desired utilities and also meet deployment limitations for network planning, we propose a supergraph tree algorithm to place base stations and relay stations at the lowest cost positio...
Chapter
Dynamic ad hoc networks (DANETs) are similar to mobile ad hoc networks (MANETs), but the network density and mobility change significantly over time and space. Many researchers have proposed types of key management schemes for ad hoc networks. In this chapter, we provide a timely survey of the existing solutions and describe the state-of-the-art te...
Conference Paper
In recent years, there are various cloud storage services have been proposed. The users can acquire the enormous cloud storage spaces through Internet even if the storage space of portable devices and handsets are limited. In this paper, we implement a distributed file system based on Apache Hadoop, and the original Hadoop distributed file system i...
Conference Paper
In recent years new research studies have appeared that concern the issue of network planning in LTE-Advanced. In this paper, the coverage problem in LTE-Advanced relay networks is formulated based on integer linear programming (ILP). We propose the Enhanced tree (E-Tree) algorithm to place the evolved Node B (eNB) and relay station (RS) at the loc...
Article
Full-text available
The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes....
Article
Full-text available
Currently, most Software Defined Radio (SDR) related products and researches focus on analog communication and voice transmission. In this paper, we propose a SDR platform with digital data communication capability. This platform consists of Field Programmable Gate Array (FPGA) based radio hardware and open source SDR software modules. The main fea...

Network

Cited By